Hi [[ session.user.profile.firstName ]]

Security for AWS Environments with Forcepoint.

As the race to move workloads and innovation into the cloud continues, security teams are often playing catch up. Forcepoint has partnered with Amazon Web Services to increase and modernize security within these environments.

In this joint webinar, Taze Miller from AWS will share security use cases, and Karlene Berger will share how Forcepoint has invested in integrations. Together, Forcepoint and AWS can deliver an integrated view of security that can drive productivity while minimizing risk for your AWS environment.
Recorded Aug 25 2020 15 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Taze Miller Partner Solutions Architect, Amazon Web Services & Karlene Berger, Sr. Director, Product Marketing, Forcepoint
Presentation preview: Security for AWS Environments with Forcepoint.

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Cloud Security Game Plan Nov 10 2020 9:00 am UTC 26 mins
    Nico Popp, Chief Product Officer, Forcepoint
    Current events have accelerated organizations' plans to migrate to cloud applications and their digital transformation efforts in general. And it’s clear that an ever-increasing number of customers expect cloud-powered security solutions moving forward. So how can you protect your remote workers wherever they are and the data they interact with? Through Secure Access Service Edge (SASE).

    In this session, see how you can:

    - Securely connect remote workers to apps and filter out non-work traffic while ensuring data accessed from both private and cloud-based apps are safe
    - Overcome the pain of dealing with traditional VPNs
    - Utilize behavioral analytics to assess and manage risk
  • A CISO’s Perspective on Zero Trust Nov 4 2020 6:00 am UTC 27 mins
    Myrna Soto, Chief Strategy and Trust Officer, Forcepoint and Andy Vautier, Chief Information Security Officer, Accenture
    During our closing signature keynote discussion we will be joined by two distinguished cybersecurity industry leaders who will share their perspectives on Zero Trust. Myrna Soto, Chief Security and Trust Officer, Forcepoint concludes the Cyber Voices Zero Trust Summit in the company of Andy Vautier, Chief Information Security Officer, Accenture.
  • Mitigating Risk in Real-Time with an Identity Aware Approach Nov 4 2020 5:15 am UTC 26 mins
    Leslie K Lambert, Lambert ASAP, LLC | Homayun Yaqub & Carolyn Ford, Forcepoint
    In today’s decentralized workplace, it’s a challenge to safeguard people connecting via personal devices and to protect the data they are working with remotely and in the cloud. We can use Identity Access Management (IAM) to onboard employees with legitimate credentials onto the network—but authenticating and authorizing users isn’t enough to ensure that everybody is acting in our best interests … or is even who they say they are.

    Learn how to best protect against compromised identities and how Zero Trust can secure enterprises from the risky behaviors of different users so you can shift left of breach, with tools and tactics including:
    - Multi-factor authentication, single sign-on, and other Unified Access Management (UAM) functions 
    - Continuous, automated analysis and scoring of user behavior to identify risky users
    - Automated, dynamic responses to risky behavior ranging from warnings and credential checks to limited or full blocking of user access and data usage


    Presenters:
    Leslie K Lambert, Chief Executive Officer, Lambert ASAP, LLC
    Homayun Yaqub, Global Security Strategist, Forcepoint
    Carolyn Ford, Cybersecurity Research Manager Forcepoint
  • Enabling Safe Remote Working with Zero Trust Nov 4 2020 3:45 am UTC 26 mins
    Carl Eberling, Ravi Srinivasan Forcepoint | Merritt Baer, Amazon Web Services |
    Getting to the web and public cloud is easy; getting to private apps is a lot trickier, especially when we’re working from home. Doing it all safely is even harder. Keeping advanced threats out and sensitive data in when people are outside the traditional boundaries of enterprise security is more important than ever.

    Zero Trust Network Access (ZTNA) is the modern approach to giving remote workers access to private apps. It eliminates the complexities and bottlenecks of using VPNs. Delivering ZTNA from a cloud platform also provides enterprises with the latest capabilities for safeguarding against internet-based attacks, compromised endpoints, “dirty” Wi-Fi networks, and even risky users.

    In this session, learn how a Zero Trust approach to providing access to web, cloud, and private apps can:
    - Make your users everywhere more productive and lower your operations costs
    - Keep advanced threats out so you can safely move to the cloud
    - Give you visibility into and control over data in your cloud



    Presenters:
    Carl Eberling, Chief Information Officer, Forcepoint
    Merritt Baer, Principal Security Architect, Amazon Web Services
    Ravi Srinivasan, Vice President, Solutions Marketing, Forcepoint
  • Opening Keynote: Moving Beyond Zero Trust Nov 4 2020 3:00 am UTC 26 mins
    Chief Executive Officer, Forcepoint | Chase Cunningham, Vice President, Principal Analyst, Forrester
    Welcome to the Cyber Voices Zero Trust Summit opening keynote! Matt Moynahan, Chief Executive Officer, Forcepoint is joined by Chase Cunningham, Vice President, Principal Analyst, Forrester during this inaugural discussion that sets the tone for the three-step blueprint for a data-aware Zero Trust approach .

    Participants:
    Matt Moynahan, Chief Executive Officer, Forcepoint and Chase Cunningham, Vice President, Principal Analyst, Forrester
  • Top 10 Cybersecurity Trends - influenced by Covid-19 Oct 28 2020 4:00 pm UTC 21 mins
    Nico Popp, Chief Product Officer, Forcepoint
    This year in 2020, we’ve arguably witnessed some of the most dramatic changes to the working environment for a generation. With so many of us now working from home, security practices have rapidly adapted to protect the new world.

    In this webinar, Forcepoint’s Chief Product Officer Nico Popp, delivers his top 10 emerging cybersecurity trends in 2020, including:

    -The end of hardware?
    -Alternatives to never-ending patches
    -Replacing the VPN with ZTNA/PA (Zero-Trust Network Access)
    -The move to SASE (Secure Access Service Edge)

    Join Nico and get his perspective on the trends that are helping shape the future of cybersecurity.
  • Enhance Your Conduct Risk Management Strategy, The financial industry is at risk Recorded: Oct 14 2020 25 mins
    Myrna Soto, Chief Security and Trust Officer Homayun Yaqub, and James Wilde
    Hear Chief Security and Trust Officer, Myrna Soto discuss these challenges with 2 leading cybersecurity strategists, Homayun Yaqub, and James Wilde.
    Are you facing challenges related to:
    -Covid-19 impact and the need for insider risk management in the financial services industry.
    -Modern conduct risk and how organizations can evolve their strategies.
    -Using continuous risk monitoring to stay ahead of breaches.
  • RBI helps to protect your C-Suite, and can reduce data loss exposure Recorded: Oct 7 2020 26 mins
    Gerry Grealish, CMO of Ericom, and Tamarian DelConte
    This is episode 3 and 4, in a 4 part series on remote browser isolation or RBI. The first episode cover how to protect your C-Suite and power users from attacks. The last episode discusses how to reduce data loss from users accessing cloud and web apps
  • Reduce exposure from risky URLs, phishing attacks, and cloud apps using RBI Recorded: Oct 2 2020 24 mins
    Gerry Grealish, CMO of Ericom, and Tamarian DelConte
    Using remote browser isolation or RBI helps you to manage risk when it comes to user access. This session includes 2 of these business use cases including, how to protect against Risky or uncategorized URLs, and how to stay ahead of phishing attacks
  • Speed, Efficiency, and Resilience – Can You Have it All? Recorded: Sep 22 2020 29 mins
    Sandy Carter, Vice President of Amazon Web Services (AWS) and Myrna Soto ,Chief Strategy and Trust Officer at Forcepoint
    Global events this year have accelerated organizations’ digital transformation efforts out of necessity. Many have done more in the last six months than in the last five years. Sandy Carter, Vice President of Amazon Web Services (AWS) and Myrna Soto ,Chief Strategy and Trust Officer at Forcepoint, discuss how this has impacted Cloud and Security strategies worldwide. As we enter this new phase, can we apply lessons learnt about speed, efficiency, and resiliency to gain competitive advantage?
  • On the Cybersecurity Forefront - Behavioral Analytics to the Rescue Recorded: Sep 16 2020 43 mins
    Bob Bragdon, SVP/Managing Dir of CSO, Worldwide at IDG and Jim Fulton, Dir, Cloud & Edge Protection Solutions, Forcepoint
    Most companies have hundreds of apps deployed in the cloud, and those numbers will only continue to increase. Securing a growing collection of cloud apps is one of the most challenging tasks for IT security teams, according to a new IDG survey. Behavioral analytics are one powerful set of tools being used to battle ever-changing cybersecurity threats in a mobile, cloud-dependent world.

    Join IDG’s Bob Bragdon and Forcepoint’s Jim Fulton as we explore the survey findings, including why behavioural analytics is growing in use and best practices for deploying such solutions from IT security practitioners.
  • Strategies for Enhancing your Conduct Risk Management. Recorded: Sep 9 2020 25 mins
    Myrna Soto, Chief Security Strategist & Trust Officer | Homayun Yaqub | James Wilde
    Join us as we discuss best practices around developing your own strategy for enhancing your conduct risk management. With most employees having to shift to remote working overnight, it has become even more challenging to strike the balance between maximizing employee productivity and minimizing your risk.

    In this webinar we’ll cover:

    - Covid-19 impact and the need for insider risk management in the financial services industry.
    - Modern conduct risk and how organizations can evolve their strategies.
    - Using continuous risk monitoring to stay ahead of breaches.
  • On the Cybersecurity Forefront: Behavioural Analytics to the Rescue Recorded: Sep 1 2020 43 mins
    Bob Bragdon, SVP/Managing Dir of CSO, Worldwide at IDG & Jim Fulton, Dir, Cloud & Edge Protection Solutions, Forcepoint
    Most companies have hundreds of apps deployed in the cloud, and those numbers will only continue to increase. Securing a growing collection of cloud apps is one of the most challenging tasks for IT security teams, according to a new IDG survey. Behavioural analytics are one powerful set of tools being used to battle ever-changing cybersecurity threats in a mobile, cloud-dependent world.

    Join IDG’s Bob Bragdon and Forcepoint’s Jim Fulton as we explore the survey findings, including why behavioural analytics is growing in use, and best practices for deploying such solutions from IT security practitioners.
  • Security for AWS Environments with Forcepoint. Recorded: Aug 25 2020 15 mins
    Taze Miller Partner Solutions Architect, Amazon Web Services & Karlene Berger, Sr. Director, Product Marketing, Forcepoint
    As the race to move workloads and innovation into the cloud continues, security teams are often playing catch up. Forcepoint has partnered with Amazon Web Services to increase and modernize security within these environments.

    In this joint webinar, Taze Miller from AWS will share security use cases, and Karlene Berger will share how Forcepoint has invested in integrations. Together, Forcepoint and AWS can deliver an integrated view of security that can drive productivity while minimizing risk for your AWS environment.
  • Exploring SASE and the Future of Network Security. Recorded: Aug 12 2020 32 mins
    Dave Barnett, Dynamic Edge Sales Specialist Director, Forcepoint & Mike Smart, Director of Product Marketing, Forcepoint
    SASE (Secure Access Service Edge) is a way to re-architect secure connectivity and is designed to help security and risk management leaders address the changes posed by digital transformation.

    Forcepoint experts Dave Barnett and Mike Smart discuss shifting infrastructures and the benefits of a single cloud-first platform. Security and IT leaders can discover key use cases for SASE:

    - Improved branch office and remote user connectivity
    - Simplified protection of users wherever they sit
    - Visibility and control of cloud-based apps and data
  • SASE Summit: Blueprint for Secure Access Service Edge (SASE) Success Recorded: Aug 11 2020 22 mins
    Nico Popp, Chief Product Officer, Forcepoint
    Implementing a true Secure Access Service Edge (SASE) architecture is a daunting task and it’s not a one size fits all approach. Nico Popp, Chief Product Officer, Forcepoint, brings the fifth and final step to adopting a SASE approach–the blueprint you need to succeed.
    Step 5 in the series continues with a practical view on:

    - How a SASE architecture is used to connect your users and protect your data
    - Actionable steps for you to build a true SASE architecture
    - How to evaluate and improve a SASE platform
    - Advice on how to leverage existing investments and a strategy for where to invest
  • SASE Summit: Becoming More Risk Aware by Understanding User Behavior Recorded: Aug 11 2020 24 mins
    Homayun Yaqub, Senior Director of Strategy, Forcepoint
    Today’s decentralized workforce offers an unprecedented risk landscape. Employees interact with enterprise data from anywhere. Attackers are getting in, and insider threats are on the rise.

    Join Kimberly Finnigan Zink, Esq., Global Information Security Compliance Officer, GlobalFoundries and Homayun Yaqub, Senior Director of Strategy, Forcepoint for Step 4 in the foundation of a Secure Access Service Edge (SASE) approach which continues with how behavior-centric analytics can differentiate between a trusted employee and a bad actor impersonating one.
  • SASE Summit: Data Protection in a Multi-Cloud Environment Recorded: Aug 11 2020 27 mins
    Eric Jackson, Vice President, Product Management, Forcepoint & Keith Vallance, Head of Product, Boldon James
    The traditional approach to data security does not encourage business productivity while still falling short when it comes to preventing data exfiltration.

    Join Keith Vallance, Head of Product, Boldon James and Eric Jackson, VP & GM, User and Data Protection, Forcepoint for Step 3 in the foundation of a Secure Access Service Edge (SASE) approach which continues with how user risk can help to get maximum from a data protection solution in a multi-cloud environment accessed by an increasingly mobile and remote workforce.
  • SASE Summit: Secure Access for a Remote Work Environment Recorded: Aug 11 2020 24 mins
    Florent Fortune, VP and GM Network and Edge Protection, Forcepoint & John Peterson, Chief Product Officer, Ericom
    Transitioning overnight to working remotely (not just checking email) has shaken many organizations.

    You’ve given people access to the apps they need, but will it scale for the long term?

    Join John Peterson, Chief Product Officer, Ericom and Florent Fortune, VP & GM, Network and Edge Protection, Forcepoint for Step 2 in the foundation of a Secure Access Service Edge (SASE) approach which continues with how you can securely provide access to apps everywhere, without the pain traditionally associated with VPNs including these three takeaways:

    1. Ensure that your team is browsing the web safely while staying productive
    2. Protect your team from malware, ransomware, and zero-day threats
    3. Protect employees from web-borne threats while working from home
  • SASE Summit: Connectivity in a Borderless World – The New Edge Recorded: Aug 11 2020 18 mins
    Nico Fischbach, Global Chief Technology Officer, Forcepoint & Elie Abouzeid, Vice President, Information Security, DentaQuest
    With your people working outside traditional offices and your data moving into cloud apps, more business is taking place outside the traditional enterprise boundary than inside. Your people are now your new perimeter.

    Step 1 in the foundation of a Secure Access Service Edge (SASE) approach starts with bringing a human-centric approach to cyber security. Join Elie Abouzeid, Vice President, Information Security, DentaQuest and Nico Fischbach Global, CTO, Forcepoint and explore new approaches to secure connectivity that can accelerate your digital transformation to the cloud.
Connect and protect your remote, global workforce
Distributed networks are the new reality of today’s mobile, global workforce. Transforming cloud connectivity and security within these networks is the new challenge. The right connectivity and security through digital transformation can provide important benefits, including increased productivity and improved user experience at a much lower cost, whether it’s for accessing cloud applications or legacy applications. Being able to use the same policies, the same tools for visualizing what's happening on a network, and extending that seamlessly into the cloud will help security teams understand use of and manage risk.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Security for AWS Environments with Forcepoint.
  • Live at: Aug 25 2020 7:00 am
  • Presented by: Taze Miller Partner Solutions Architect, Amazon Web Services & Karlene Berger, Sr. Director, Product Marketing, Forcepoint
  • From:
Your email has been sent.
or close